Impact
DynamicWeb’s JobRunnerBackground.aspx is vulnerable to path traversal and content injection attacks that can be exploited without authentication. An attacker who sends crafted web requests can manipulate file paths and execute arbitrary code on the server, giving full control over the system. The vulnerability is classified as CWE-22, indicating a flaw in controlling access to file system paths.
Affected Systems
DynamicWeb 8 (all releases) and DynamicWeb 9 (versions prior to 9.19.7 and prior to 9.20.3) are affected. The issue resides in the JobRunnerBackground.aspx component, which is widely used across these product generations.
Risk and Exploitability
The vulnerability carries a CVSS score of 10, rating it as critical. The EPSS score is below 1%, indicating a low current exploitation probability, and the vulnerability is not listed in the CISA KEV catalog. Nonetheless, the attack vector is remote, HTTP-based, and requires no authentication, allowing any internet-exposed attacker to exploit the flaw by sending specifically crafted requests to the vulnerable endpoint.
OpenCVE Enrichment